Concrete signature match: Backdoor - Provides unauthorized remote access for Linux platform, family Gafgyt
This is a concrete detection of Backdoor:Linux/Gafgyt.BA!xp, a Linux-based backdoor from the Gafgyt family known for targeting IoT devices. It attempts to gain unauthorized access by brute-forcing common credentials on systems like Dreambox or XMHDIPC, establishing remote control for various malicious activities. While primarily Linux, the presence of Windows-specific strings suggests potential broader attack capabilities or multi-stage components.
Relevant strings associated with this threat: - |#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID) - }#d1e49aac-8f56-4280-b9ba-993a6d77406c (NID) - &|#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID) - &}#b2b3f03d-6a65-4f7b-a9c7-1c7ef74a9ba4 (NID) - C|#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID) - C}#be9ba2d9-53ea-4cdc-84e5-9b1eeee46550 (NID) - |#7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (NID) - }#7674ba52-37eb-4a4f-a9a1-f0f9a1619a2c (NID) - !#HSTR:IntentBase64 (PEHSTR_EXT) - ToBase64String (PEHSTR_EXT) - !#HSTR:StringCodeForMshta.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.C!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.D!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.L!pli (PEHSTR_EXT) - !#HSTR:StringCodeForHooking.O!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRegsvr32.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForRundll32.A!pli (PEHSTR_EXT) - rundll32 (PEHSTR_EXT) - !#HSTR:StringCodeForBITSJobs.A!pli (PEHSTR_EXT) - !#HSTR:StringCodeForPowerShell.G!pli (PEHSTR_EXT)
rule Backdoor_Linux_Gafgyt_BA_2147817853_0
{
meta:
author = "threatcheck.sh"
detection_name = "Backdoor:Linux/Gafgyt.BA!xp"
threat_id = "2147817853"
type = "Backdoor"
platform = "Linux: Linux platform"
family = "Gafgyt"
severity = "Critical"
info = "xp: an internal category used to refer to some threats"
signature_type = "SIGNATURE_TYPE_ELFHSTR_EXT"
threshold = "6"
strings_accuracy = "High"
strings:
$x_2_1 = "dreambox" ascii //weight: 2
$x_2_2 = "xmhdipc" ascii //weight: 2
$x_1_3 = "admin1234" ascii //weight: 1
$x_1_4 = "klv123" ascii //weight: 1
$n_1_5 = "com.bitdefender" ascii //weight: -1
condition:
(filesize < 20MB) and
(not (any of ($n*))) and
(all of ($x*))
}26e1c7ac50319b3bacf336cbaaec770caac9bc9ceb6b9b87fceca53ecef664fffe9e87095153191ba77fd7eed720b0b1ac1ebd39176c9b9926b2af899b58507550825416445643e9f0395618392e964f6668bd7090cce27dc5e61421b12523b5b3a8a0f242041630931fbe99484290b342866b3c98e658fe83961d0f4219e91d80ee20cbbb9ae55730cbc841c0581642f9245b27627ae2a61f6827803d304b8eImmediately isolate any affected Linux or IoT systems. Change all default and weak credentials, ensure firmware and software are up to date on IoT devices, and enforce strong, unique passwords. Perform a full system scan with updated security software to remove the malware and monitor network traffic for any command-and-control activity.